必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       74.48.0.0 - 74.49.127.255
CIDR:           74.49.0.0/17, 74.48.0.0/16
NetName:        TELUS-3
NetHandle:      NET-74-48-0-0-1
Parent:         NET74 (NET-74-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   TELUS Communications Inc. (TACE)
RegDate:        2006-02-09
Updated:        2021-07-15
Ref:            https://rdap.arin.net/registry/ip/74.48.0.0



OrgName:        TELUS Communications Inc.
OrgId:          TACE
Address:        510 W Georgia St
City:           Vancouver
StateProv:      BC
PostalCode:     V6B 2A3
Country:        CA
RegDate:        
Updated:        2025-10-16
Ref:            https://rdap.arin.net/registry/entity/TACE


OrgAbuseHandle: AAT-ARIN
OrgAbuseName:   Abuse at TELUS
OrgAbusePhone:  +1-877-945-8220 
OrgAbuseEmail:  abuse@telus.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AAT-ARIN

OrgTechHandle: TBOTP-ARIN
OrgTechName:   TELUS BC ORG TECH POC
OrgTechPhone:  +1-877-310-8324 
OrgTechEmail:  IPadmin@telus.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TBOTP-ARIN

# end


# start

NetRange:       74.48.128.0 - 74.48.191.255
CIDR:           74.48.128.0/18
NetName:        MULTA-NET
NetHandle:      NET-74-48-128-0-1
Parent:         TELUS-3 (NET-74-48-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   MULTACOM CORPORATION (MULTA)
RegDate:        2023-09-28
Updated:        2023-09-28
Ref:            https://rdap.arin.net/registry/ip/74.48.128.0


OrgName:        MULTACOM CORPORATION
OrgId:          MULTA
Address:        16654 Soledad Canyon Rd #150
City:           Canyon Country
StateProv:      CA
PostalCode:     91387
Country:        US
RegDate:        2005-03-23
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/MULTA

ReferralServer:  rwhois://rwhois.multacom.com:4321

OrgAbuseHandle: ABUSE898-ARIN
OrgAbuseName:   Abuse Department
OrgAbusePhone:  +1-661-554-0287 
OrgAbuseEmail:  abuse@multacom.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

OrgTechHandle: NOC1793-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-661-977-9436 
OrgTechEmail:  noc@multacom.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

RNOCHandle: NOC1793-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-661-977-9436 
RNOCEmail:  noc@multacom.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC1793-ARIN

RAbuseHandle: ABUSE898-ARIN
RAbuseName:   Abuse Department
RAbusePhone:  +1-661-554-0287 
RAbuseEmail:  abuse@multacom.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE898-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.multacom.com:4321.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.48.144.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.48.144.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 155 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 20:24:14 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 143.144.48.74.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.144.48.74.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.139.195.214 attackspambots
May 15 14:39:52 PorscheCustomer sshd[29313]: Failed password for root from 177.139.195.214 port 47518 ssh2
May 15 14:44:37 PorscheCustomer sshd[29469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.195.214
May 15 14:44:39 PorscheCustomer sshd[29469]: Failed password for invalid user dev from 177.139.195.214 port 57008 ssh2
...
2020-05-15 20:47:33
217.163.30.151 attack
2020-05-15 21:05:23
162.243.137.12 attackbots
Fail2Ban Ban Triggered
2020-05-15 20:42:57
14.29.167.181 attackspam
2020-05-15T12:26:28.289589shield sshd\[27762\]: Invalid user duck from 14.29.167.181 port 56734
2020-05-15T12:26:28.295615shield sshd\[27762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.167.181
2020-05-15T12:26:29.937354shield sshd\[27762\]: Failed password for invalid user duck from 14.29.167.181 port 56734 ssh2
2020-05-15T12:28:52.834833shield sshd\[28258\]: Invalid user svn from 14.29.167.181 port 40852
2020-05-15T12:28:52.838550shield sshd\[28258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.167.181
2020-05-15 20:41:28
35.200.248.104 attackbots
35.200.248.104 - - [15/May/2020:14:28:51 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.200.248.104 - - [15/May/2020:14:28:53 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.200.248.104 - - [15/May/2020:14:28:55 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-15 20:38:11
80.82.77.42 attackbots
80.82.77.42 was recorded 7 times by 3 hosts attempting to connect to the following ports: 5632,69,1434. Incident counter (4h, 24h, all-time): 7, 35, 246
2020-05-15 20:44:59
106.12.161.118 attackbots
May 15 15:00:11 ns381471 sshd[15656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.161.118
May 15 15:00:14 ns381471 sshd[15656]: Failed password for invalid user dev from 106.12.161.118 port 55756 ssh2
2020-05-15 21:01:12
212.73.136.72 attackspam
May 15 15:03:11 [host] sshd[6341]: Invalid user lo
May 15 15:03:11 [host] sshd[6341]: pam_unix(sshd:a
May 15 15:03:12 [host] sshd[6341]: Failed password
2020-05-15 21:04:17
46.101.31.59 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-15 21:09:34
167.71.232.250 attackbots
May 15 14:28:10 plex sshd[12971]: Invalid user frank from 167.71.232.250 port 46476
2020-05-15 21:13:50
73.200.119.131 attackspam
DATE:2020-05-15 14:28:49, IP:73.200.119.131, PORT:ssh SSH brute force auth (docker-dc)
2020-05-15 20:45:29
222.186.42.137 attack
2020-05-15T14:50:18.956238vps751288.ovh.net sshd\[10612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-05-15T14:50:20.578155vps751288.ovh.net sshd\[10612\]: Failed password for root from 222.186.42.137 port 32913 ssh2
2020-05-15T14:50:23.029880vps751288.ovh.net sshd\[10612\]: Failed password for root from 222.186.42.137 port 32913 ssh2
2020-05-15T14:50:29.458140vps751288.ovh.net sshd\[10612\]: Failed password for root from 222.186.42.137 port 32913 ssh2
2020-05-15T14:50:32.997747vps751288.ovh.net sshd\[10622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-05-15 20:53:24
222.186.175.215 attackspam
May 15 14:43:53 pve1 sshd[2160]: Failed password for root from 222.186.175.215 port 9288 ssh2
May 15 14:43:58 pve1 sshd[2160]: Failed password for root from 222.186.175.215 port 9288 ssh2
...
2020-05-15 20:49:56
216.218.206.111 attackbots
May 15 14:28:54 debian-2gb-nbg1-2 kernel: \[11804583.038772\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=216.218.206.111 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=45891 DPT=389 WINDOW=65535 RES=0x00 SYN URGP=0
2020-05-15 20:37:25
37.139.20.6 attack
May 15 14:28:52 vps647732 sshd[6392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.20.6
May 15 14:28:53 vps647732 sshd[6392]: Failed password for invalid user fd from 37.139.20.6 port 35372 ssh2
...
2020-05-15 20:41:07

最近上报的IP列表

2606:4700:10::6814:9411 154.23.164.35 35.88.17.121 175.107.211.157
121.43.152.182 47.92.241.42 39.100.81.231 149.56.160.175
66.132.172.178 176.65.139.231 198.199.104.186 2606:4700:10::6814:6640
2606:4700:10::6814:8896 49.175.36.22 74.41.154.158 182.187.88.177
212.73.148.41 43.128.73.132 39.98.88.157 58.71.239.99